default search action
IEEE Transactions on Dependable and Secure Computing, Volume 19
Volume 19, Number 1, January - February 2022
- Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus A. Benson, Matthew Roughan, Vijay Sivaraman:
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles. 1-18 - Zhou Su, Yuntao Wang, Qichao Xu, Ning Zhang:
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue. 19-32 - Dan Brownstein, Shlomi Dolev, Muni Venkateswarlu Kumaramangalam:
Self-Stabilizing Secure Computation. 33-38 - Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. 39-53 - Gurjit Singh Walia, Kartik Aggarwal, Kuldeep Singh, Kunwar Singh:
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach. 54-66 - Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. 67-76 - Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. 77-90 - Rui Li, Alex X. Liu, Huanle Xu, Ying Liu, Huaqiang Yuan:
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data. 91-106 - Guillermo Suarez-Tangil, Gianluca Stringhini:
Eight Years of Rider Measurement in the Android Malware Ecosystem. 107-118 - Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. 119-130 - Qingyu Yang, Donghe Li, Dou An, Wei Yu, Xinwen Fu, Xinyu Yang, Wei Zhao:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. 131-148 - Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng:
Authenticated Data Redaction With Accountability and Transparency. 149-160 - Mohamad Chehab, Azzam Mourad:
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT. 161-175 - Sateesh Kumar Awasthi, Yatindra Nath Singh:
AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks. 176-189 - Yanhua Du, Yang Wang, Benyuan Yang, Hesuan Hu:
Analyzing Security Requirements in Timed Workflow Processes. 190-207 - Xing Gao, Guannan Liu, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy. 208-226 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir, Omar Alfandi:
On the Validation of Web X.509 Certificates by TLS Interception Products. 227-242 - Lucas Palazzi, Guanpeng Li, Bo Fang, Karthik Pattabiraman:
Improving the Accuracy of IR-Level Fault Injection. 243-258 - Yuchen Zhao, Isabel Wagner:
Using Metrics Suites to Improve the Measurement of Privacy in Graphs. 259-274 - Kyungmin Go, Il-Gu Lee, Sungwon Kang, Myungchul Kim:
Secure Video Transmission Framework for Battery-Powered Video Devices. 275-287 - Fritz Previlon, Charu Kalra, Devesh Tiwari, David R. Kaeli:
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications. 288-300 - Cheng Wang, Hangyu Zhu:
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services. 301-315 - Dezhi Han, Nannan Pan, Kuan-Ching Li:
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection. 316-327 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. 328-338 - Rajorshi Biswas, Jie Wu:
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. 339-352 - Ruimin Sun, Marcus Botacin, Nikolaos Sapountzis, Xiaoyong Yuan, Matt Bishop, Donald E. Porter, Xiaolin Li, Andre Gregio, Daniela Oliveira:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. 353-369 - Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. 370-387 - Yanguo Peng, Long Wang, Jiangtao Cui, Ximeng Liu, Hui Li, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. 388-401 - Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. 402-418 - Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, Damith C. Ranasinghe:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. 419-437 - Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier Y. de Vel, Paul Montague, Yang Xiang:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. 438-451 - Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. 452-467 - Lotfi Ben Othmane, Lalitha Dhulipala, Moataz AbdelKhalek, Nicholas J. Multari, Manimaran Govindarasu:
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. 468-481 - Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen:
Verifiable Policy-Defined Networking Using Metagraphs. 482-494 - Felix Erlacher, Falko Dressler:
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. 495-506 - Chenyu Wang, Ding Wang, Yi Tu, Guoai Xu, Huaxiong Wang:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. 507-523 - Naman Patel, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Michael Shamouilian, Ramesh Karri, Farshad Khorrami:
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. 524-536 - Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
Improved Fast Rerouting Using Postprocessing. 537-550 - Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, Xutong Chen:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. 551-565 - George Theodorakopoulos, Emmanouil Panaousis, Kaitai Liang, George Loukas:
On-the-Fly Privacy for Location Histograms. 566-578 - Ruiyu Zhu, Yan Huang:
Efficient and Precise Secure Generalized Edit Distance and Beyond. 579-590 - Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. 591-606 - Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. 607-619 - Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia:
Understanding Account Recovery in the Wild and its Security Implications. 620-634 - Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong, Nenghai Yu:
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. 635-646 - Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu, Joseph K. Liu, Dawu Gu:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. 647-662 - Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. 663-680 - Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. 681-697 - Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au:
Geometric Range Search on Encrypted Data With Forward/Backward Security. 698-716
Volume 19, Number 2, March - April 2022
- Yunji Liang, Qiushi Wang, Kang Xiong, Xiaolong Zheng, Zhiwen Yu, Daniel Zeng:
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning. 717-730 - Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
Alert-Driven Attack Graph Generation Using S-PDFA. 731-746 - Rohit Valecha, Pranali Mandaokar, H. Raghav Rao:
Phishing Email Detection Using Persuasion Cues. 747-756 - Huiling Li, Jun Wu, Hansong Xu, Gaolei Li, Mohsen Guizani:
Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach. 757-775 - Yi-Ting Huang, Chi Yu Lin, Ying-Ren Guo, Kai-Chieh Lo, Yeali S. Sun, Meng Chang Chen:
Open Source Intelligence for Malicious Behavior Discovery and Interpretation. 776-789 - Yidong Chai, Yonghang Zhou, Weifeng Li, Yuanchun Jiang:
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. 790-803 - Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game. 804-816 - Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay:
Greyhound: Directed Greybox Wi-Fi Fuzzing. 817-834 - Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi:
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity. 835-847 - Eduardo Chielle, Nektarios Georgios Tsoutsos, Oleg Mazonka, Michail Maniatakos:
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation. 848-861 - Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. 862-878 - Zhihai Yang, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. 879-896 - Xin Liao, Jiaojiao Yin, Mingliang Chen, Zheng Qin:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. 897-911 - Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. 912-923 - Vlad Craciun, Pascal Felber, Andrei Mogage, Emanuel Onica, Rafael Pires:
Malware in the SGX Supply Chain: Be Careful When Signing Enclaves! 924-935 - Longxia Huang, Junlong Zhou, Gongxuan Zhang, Jin Sun, Tongquan Wei, Shui Yu, Shiyan Hu:
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds. 936-952 - Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. 953-965 - Pedro Reviriego, Jorge Martínez, Ori Rottenstreich, Shanshan Liu, Fabrizio Lombardi:
Remove Minimum (RM): An Error-Tolerant Scheme for Cardinality Estimate by HyperLogLog. 966-977 - Bing Chen, Wei Lu, Jiwu Huang, Jian Weng, Yicong Zhou:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. 978-991 - Zhaoxia Yin, Yinyin Peng, Youzhi Xiang:
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression. 992-1002 - Lingjuan Lyu, Yitong Li, Karthik Nandakumar, Jiangshan Yu, Xingjun Ma:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. 1003-1017 - Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, Ribal F. Atallah, Bernard Lebel:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. 1018-1035 - Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang:
Dual Access Control for Cloud-Based Data Storage and Sharing. 1036-1048 - Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen, Amro Awad:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. 1049-1063 - Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. 1064-1077 - Shahram Khazaei, Mojtaba Rafiee:
Towards More Secure Constructions of Adjustable Join Schemes. 1078-1089 - Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data. 1090-1103 - Ning Xie, Zhuoyuan Li, Jie Tan, Alex X. Liu:
Detection of Information Hiding at Physical Layer in Wireless Communications. 1104-1117 - Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. 1118-1132 - Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. 1133-1148 - Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. 1149-1163 - Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. 1164-1180 - Yazdan Movahedi, Michel Cukier, Ilir Gashi:
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. 1181-1193 - Harshan Jagadeesh, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. 1194-1211 - Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou, Philip S. Yu:
Differentially Private Multi-Agent Planning for Logistic-Like Problems. 1212-1226 - Dariush Abbasinezhad-Mood, Sayyed Majid Mazinani, Morteza Nikooghadam, Arezou Ostad-Sharif:
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision. 1227-1238 - Fabrizio Cicala, Elisa Bertino:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. 1239-1253 - Mandrita Banerjee, Carlo Borges, Kim-Kwang Raymond Choo, Junghee Lee, Chrysostomos Nicopoulos:
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems. 1254-1265 - Yang Liu, Tong Feng, Mugen Peng, Jianfeng Guan, Yu Wang:
DREAM: Online Control Mechanisms for Data Aggregation Error Minimization in Privacy-Preserving Crowdsensing. 1266-1279 - Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu, Zhen Zhao, Qiong Huang:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. 1280-1291 - Djamel Eddine Kouicem, Youcef Imine, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. 1292-1306 - Bernardo Ferreira, Bernardo Portela, Tiago Oliveira, Guilherme Borges, Henrique João L. Domingos, João Leitão:
Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware. 1307-1319 - Haining Yang, Ye Su, Jing Qin, Huaxiong Wang:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. 1320-1337 - Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari:
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. 1338-1351 - Benyuan Yang, Hesuan Hu:
Dynamic Implementation of Security Requirements in Business Processes. 1352-1363 - Guowen Xu, Hongwei Li, Yun Zhang, Shengmin Xu, Jianting Ning, Robert H. Deng:
Privacy-Preserving Federated Deep Learning With Irregular Users. 1364-1381 - Zi-Long Liu, Chi-Man Pun:
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation. 1382-1394 - Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
Loco-Store: Locality-Based Oblivious Data Storage. 1395-1406 - Maryam Zarezadeh, Hamid Mala, Behrouz Tork Ladani:
Efficient Secure Pattern Matching With Malicious Adversaries. 1407-1419 - Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. 1420-1433
Volume 19, Number 3, May - June 2022
- Yanhai Xiong, Giridhar Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. 1434-1445 - Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang:
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. 1446-1463 - Jian Shen, Ziyuan Gui, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. 1464-1475 - Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella:
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems. 1476-1491 - Fengwei Wang, Hui Zhu, Rongxing Lu, Yandong Zheng, Hui Li:
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets. 1492-1504 - Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Wei Wei:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. 1505-1517 - Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. 1518-1531 - Hongbo Li, Qiong Huang, Willy Susilo:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. 1532-1543 - Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen:
Path Sensitive Fuzzing for Native Applications. 1544-1561 - Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. 1562-1578 - Zheli Liu, Siyi Lv, Jin Li, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. 1579-1591 - Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. 1592-1604 - Christian Berger, Hans P. Reiser, João Sousa, Alysson Bessani:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. 1605-1620 - Runqing Yang, Xutong Chen, Haitao Xu, Yueqiang Cheng, Chunlin Xiong, Linqi Ruan, Mohammad Kavousi, Zhenyuan Li, Liheng Xu, Yan Chen:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. 1621-1638 - Qiang Wang, Fucai Zhou, Boyang Zhou, Jian Xu, Chunyu Chen, Qi Wang:
Privacy-Preserving Publicly Verifiable Databases. 1639-1654 - Matthias Eckhart, Andreas Ekelhart, Edgar R. Weippl:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. 1655-1672 - Sandeep Nair Narayanan, Anupam Joshi, Ranjan Bose:
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. 1673-1686 - Xiaoning Liu, Yifeng Zheng, Xun Yi, Surya Nepal:
Privacy-Preserving Collaborative Analytics on Medical Time Series Data. 1687-1702 - Chaoyue Niu, Fan Wu, Shaojie Tang, Shuai Ma, Guihai Chen:
Toward Verifiable and Privacy Preserving Machine Learning Prediction. 1703-1721 - Milan Stute, Florian Kohnhäuser, Lars Baumgärtner, Lars Almon, Matthias Hollick, Stefan Katzenbeisser, Bernd Freisleben:
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies. 1722-1734 - Haishou Ma, Yi Xie, Shensheng Tang, Jiankun Hu, Xingcheng Liu:
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field. 1735-1752 - Jianbing Ni, Kuan Zhang, Yong Yu, Tingting Yang:
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage. 1753-1769 - Anomadarshi Barua, Deepan Muthirayan, Pramod P. Khargonekar, Mohammad Abdullah Al Faruque:
Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids. 1770-1782 - Atif Saeed, Peter Garraghan, Syed Asad Hussain:
Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments. 1783-1794 - Haijun Wang, Ye Liu, Yi Li, Shangwei Lin, Cyrille Artho, Lei Ma, Yang Liu:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. 1795-1809 - Ji-Ming Chen, Xiangshan Gao, Ruilong Deng, Yang He, Chongrong Fang, Peng Cheng:
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems. 1810-1825 - Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. 1826-1840 - Yifeng Zheng, Huayi Duan, Cong Wang, Ruochen Wang, Surya Nepal:
Securely and Efficiently Outsourcing Decision Tree Inference. 1841-1855 - Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim:
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption. 1856-1870 - Shuzhou Sun, Hui Ma, Zishuai Song, Rui Zhang:
WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms. 1871-1884 - Zengpeng Li, Ding Wang, Eduardo Morais:
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices. 1885-1899 - Huaijin Wang, Shuai Wang, Dongpeng Xu, Xiangyu Zhang, Xiao Liu:
Generating Effective Software Obfuscation Sequences With Reinforcement Learning. 1900-1917 - Bo Jiang, Ming Li, Ravi Tandon:
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation. 1918-1935 - Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. 1936-1954 - Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan:
Probabilistic Path Prioritization for Hybrid Fuzzing. 1955-1973 - Ning Lu, Yuan Chang, Wenbo Shi, Kim-Kwang Raymond Choo:
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions. 1974-1987 - Behrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson:
An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors in Programs. 1988-2006 - Huadi Zheng, Qingqing Ye, Haibo Hu, Chengfang Fang, Jie Shi:
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation. 2007-2022 - Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, Changyu Dong:
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. 2023-2037 - Yanjiao Chen, Xin Tian, Qian Wang, Jianlin Jiang, Minghui Li, Qian Zhang:
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. 2038-2053 - Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. 2054-2069 - Yizhong Liu, Jianwei Liu, Qianhong Wu, Hui Yu, Yiming Hei, Ziyu Zhou:
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework. 2070-2088 - Hu Xiong, Jinhao Chen, Qian Mei, Yanan Zhao:
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs. 2089-2104 - Reem M. Albarrak, Daniel A. Menascé:
Trust But Verify: A Framework for the Trustworthiness of Distributed Systems. 2105-2121 - Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. 2122-2137 - Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. 2138-2148
Volume 19, Number 4, July - August 2022
- Sagar Samtani, Hsinchun Chen, Murat Kantarcioglu, Bhavani Thuraisingham:
Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI). 2149-2150 - Miquel Martínez, Juan Carlos Ruiz, Nuno Antunes, David de Andrés, Marco Vieira:
A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools. 2151-2164 - Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. 2165-2178 - Moshe Kravchik, Asaf Shabtai:
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA. 2179-2197 - Jian Shen, Huijie Yang, Pandi Vijayakumar, Neeraj Kumar:
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing. 2198-2210 - Satendra Pal Singh, Gaurav Bhatnagar, Amit Kumar Singh:
A New Robust Reference Image Hashing System. 2211-2225 - Mohamed Baza, Marbin Pazos-Revilla, Ahmed B. T. Sherif, Mahmoud Nabil, Abdulah Jeza Aljohani, Mohamed Mahmoud, Waleed Alasmary:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids. 2226-2243 - Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. 2244-2258 - Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni:
Function Representations for Binary Similarity. 2259-2273 - Soroush Aalibagi, Hamidreza Mahyar, Ali Movaghar, Harry Eugene Stanley:
A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things. 2274-2285 - Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui:
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network. 2286-2303 - Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim:
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. 2304-2317 - Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. 2318-2332 - Qiang He, Cheng Wang, Guangming Cui, Bo Li, Rui Zhou, Qingguo Zhou, Yang Xiang, Hai Jin, Yun Yang:
A Game-Theoretical Approach for Mitigating Edge DDoS Attack. 2333-2348 - Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. 2349-2364 - Yunxiao Zhang, Pasquale Malacaria:
Optimization-Time Analysis for Cybersecurity. 2365-2383 - Ferucio Laurentiu Tiplea:
Lessons to be Learned for a Good Design of Private RFID Schemes. 2384-2395 - Mateus Martínez De Lucena, Antônio Augusto Fröhlich:
Security and Effectiveness Analysis of the Gateway Integrity Checking Protocol. 2396-2404 - Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. 2405-2420 - Pedro Reviriego, Daniel Ting:
Breaking Cuckoo Hash: Black Box Attacks. 2421-2427 - Qian Han, Cristian Molinaro, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian, Yanhai Xiong:
Generating Fake Documents Using Probabilistic Logic Graphs. 2428-2441 - Zhiguo Wan, Tong Zhang, Weizhuang Liu, Mingqiang Wang, Liehuang Zhu:
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain. 2442-2456 - Mahmood Azhar Qureshi, Arslan Munir:
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol. 2457-2475 - Hassan Nasiraee, Maede Ashouri-Talouki:
Privacy-Preserving Distributed Data Access Control for CloudIoT. 2476-2487 - Essam Soliman Debie, Nour Moustafa, Athanasios V. Vasilakos:
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network. 2488-2500 - Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data. 2501-2516 - Suryadipta Majumdar, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ProSAS: Proactive Security Auditing System for Clouds. 2517-2534 - Mojtaba Rafiee, Shahram Khazaei:
Security of Multi-Adjustable Join Schemes: Separations and Implications. 2535-2545 - Siva Kumar Sastry Hari, Michael B. Sullivan, Timothy Tsai, Stephen W. Keckler:
Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques. 2546-2558 - Seongman Lee, Hyeonwoo Kang, Jinsoo Jang, Brent ByungHoon Kang:
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout. 2559-2575 - Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
Making Information Hiding Effective Again. 2576-2594 - Giovanni Mazzeo, Sergei Arnautov, Christof Fetzer, Luigi Romano:
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization. 2595-2608 - Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. 2609-2621 - Jun Wang, Chao Jin, Qiang Tang, Zhe Liu, Khin Mi Mi Aung:
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy. 2622-2634 - Dalton Cole, Sara Newman, Dan Lin:
A New Facial Authentication Pitfall and Remedy in Web Services. 2635-2647 - Shaoyong Du, Minrui Zhao, Jingyu Hua, Hang Zhang, Xiaoyu Chen, Zhiyun Qian, Sheng Zhong:
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud. 2648-2664 - Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. 2665-2679 - Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. 2680-2694 - Long Zhang, Brice Morin, Benoit Baudry, Martin Monperrus:
Maximizing Error Injection Realism for Chaos Engineering With System Calls. 2695-2708 - Savio Sciancalepore, Pietro Tedeschi, Ahmed Aziz, Roberto Di Pietro:
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts. 2709-2726 - Shunrong Jiang, Jianqing Liu, Yong Zhou, Yuguang Fang:
FVC-Dedup: A Secure Report Deduplication Scheme in a Fog-Assisted Vehicular Crowdsensing System. 2727-2740 - Xuyang Jing, Hui Han, Zheng Yan, Witold Pedrycz:
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification. 2741-2754 - Lumin Shi, Jun Li, Mingwei Zhang, Peter L. Reiher:
On Capturing DDoS Traffic Footprints on the Internet. 2755-2770 - Xiaojie Zhu, Erman Ayday, Roman Vitenberg, Narasimha Raghavan Veeraragavan:
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud. 2771-2788 - Yuan Zhang, Chunxiang Xu, Nan Cheng, Xuemin Shen:
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems. 2789-2806 - Runhua Xu, James Joshi, Chao Li:
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets. 2807-2820 - Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. 2821-2837 - Yuan Su, Yanping Li, Bo Yang, Yong Ding:
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage. 2838-2850 - Fatemah Alharbi, Yuchen Zhou, Feng Qian, Zhiyun Qian, Nael B. Abu-Ghazaleh:
DNS Poisoning of Operating System Caches: Attacks and Mitigations. 2851-2863
Volume 19, Number 5, September - October 2022
- Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. 2864-2872 - Jun Qiu, Xuewu Yang, Huamao Wu, Yajin Zhou, Jinku Li, Jianfeng Ma:
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications. 2873-2889 - Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Myong H. Kang, James Kirby:
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC). 2890-2906 - Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. 2907-2919 - Seema Kumar, Patrick Eugster, Silvia Santini:
Software-Based Remote Network Attestation. 2920-2933 - Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. 2934-2951 - Cláudio Correia, Miguel Correia, Luís Rodrigues:
Omega: A Secure Event Ordering Service for the Edge. 2952-2964 - Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. 2965-2981 - Xuejing Zhou, Wanli Peng, Boya Yang, Juan Wen, Yiming Xue, Ping Zhong:
Linguistic Steganography Based on Adaptive Probability Distribution. 2982-2997 - Bowen Wang, Kangjie Lu, Qiushi Wu, Aditya Pakki:
Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing. 2998-3010 - Chen Chen, Roman Vitenberg, Hans-Arno Jacobsen:
Building Fault-Tolerant Overlays With Low Node Degrees for Topic-Based Publish/Subscribe. 3011-3023 - Hua Deng, Jixin Zhang, Zheng Qin, Qianhong Wu, Hui Yin, Aniello Castiglione:
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. 3024-3037 - Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. 3038-3054 - Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, Liming Fang:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. 3055-3070 - Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Marco Tambasco:
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem. 3071-3086 - Meng Ma, Weilan Lin, Disheng Pan, Ping Wang:
ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures. 3087-3100 - Jing Lei, Qingqi Pei, Yao Wang, Wenhai Sun, Xuefeng Liu:
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials. 3101-3112 - Hwimin Kim, Dae-Kyoo Kim, Alaa S. Alaerjan:
ABAC-Based Security Model for DDS. 3113-3124 - Zhangjie Fu, Yueyan Zhi, Shouling Ji, Xingming Sun:
Remote Attacks on Drones Vision Sensors: An Empirical Study. 3125-3135 - Yinjin Fu, Nong Xiao, Tao Chen, Jian Wang:
Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication. 3136-3148 - Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. 3149-3167 - Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng, Xinyi Huang:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. 3168-3182 - Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang:
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks. 3183-3199 - Lei Bu, Zhe Zhao, Yuchao Duan, Fu Song:
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain. 3200-3217 - Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah:
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. 3218-3230 - Beilei Zheng, Jianan Gu, Jialun Wang, Chuliang Weng:
CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks. 3231-3243 - Himani Sikarwar, Debasis Das:
Towards Lightweight Authentication and Batch Verification Scheme in IoV. 3244-3256 - Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia:
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping. 3257-3270 - Haoyu Ma, Shijia Li, Debin Gao, Chunfu Jia:
Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture. 3271-3285 - Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. 3286-3300 - Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu:
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. 3301-3311 - Shaharyar Khan, Stuart E. Madnick:
Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems. 3312-3328 - Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang, Chao Shen, Qi Li:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. 3329-3342 - Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, Nenghai Yu:
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models. 3343-3356 - Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. 3357-3370 - Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh:
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. 3371-3386 - Jingjing Zhang, Yingyao Rong, Jiannong Cao, Chunming Rong, Jing Bian, Weigang Wu:
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation. 3387-3400 - Yu Guo, Hongcheng Xie, Cong Wang, Xiaohua Jia:
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services. 3401-3416 - Sara Mohammadi, Frank Eliassen, Yan Zhang, Hans-Arno Jacobsen:
Detecting False Data Injection Attacks in Peer to Peer Energy Trading Using Machine Learning. 3417-3431 - Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. 3432-3447 - Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. 3448-3463 - Yen-Lin Lee, Deron Liang, Wei-Jen Wang:
Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems. 3464-3477 - Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud. 3478-3493 - Shijie Jia, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. 3494-3507 - Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia:
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing. 3508-3520 - Xi Xiao, Wentao Xiao, Rui Li, Xiapu Luo, Haitao Zheng, Shutao Xia:
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification. 3521-3538 - Pedro Reviriego, Alfonso Sánchez-Macián, Shanshan Liu, Fabrizio Lombardi:
On the Security of the K Minimum Values (KMV) Sketch. 3539-3545 - Jian Yang, Qi Zhang, Xiaofeng Jiang, Shuangwu Chen, Feng Yang:
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection. 3546-3563 - Liming Fang, Minghui Li, Zhe Liu, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. 3564-3578
Volume 19, Number 6, November - December 2022
- Hanan Hibshi, Stephanie T. Jones, Travis D. Breaux:
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements. 3579-3591 - Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao, Hui Ma:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. 3592-3606 - Xinyu Zhang, Bingsheng Zhang, Aggelos Kiayias, Thomas Zacharias, Kui Ren:
An Efficient E2E Crowd Verifiable E-Voting System. 3607-3620 - Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks. 3621-3639 - Chengjun Cai, Lei Xu, Anxin Zhou, Cong Wang:
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains. 3640-3655 - Qilei Yin, Zhuotao Liu, Qi Li, Tao Wang, Qian Wang, Chao Shen, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. 3656-3670 - Yang Liu, Zhuo Ma, Yilong Yang, Ximeng Liu, Jianfeng Ma, Kui Ren:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. 3671-3685 - Jianan Gu, Yukun Ma, Beilei Zheng, Chuliang Weng:
Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection. 3686-3698 - Yuchang Mo, Liudong Xing:
Efficient Analysis of Resource Availability for Cloud Computing Systems to Reduce SLA Violations. 3699-3710 - Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim:
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison. 3711-3727 - Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui:
Agora: A Privacy-Aware Data Marketplace. 3728-3740 - Pengfei Wu, Qi Li, Jianting Ning, Xinyi Huang, Wei Wu:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. 3741-3758 - Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. 3759-3773 - Xiang Gao, Jia Yu, Yan Chang, Huaqun Wang, Jianxi Fan:
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. 3774-3789 - Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, Danfeng Yao:
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. 3790-3803 - Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. 3804-3821 - Jordan Samhi, Alexandre Bartel:
On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps. 3822-3836 - Yi Wang, Rongmao Chen, Xinyi Huang, Baosheng Wang:
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. 3837-3854 - Yongyi Cao, Hao Jiang, Yuchuan Deng, Jing Wu, Pan Zhou, Wei Luo:
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network. 3855-3872 - Lin Yao, Zhenyu Chen, Haipeng Dai, Guowei Wu:
Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network. 3873-3886 - Federico Daidone, Barbara Carminati, Elena Ferrari:
Blockchain-Based Privacy Enforcement in the IoT Domain. 3887-3898 - Pei Huang, Xiaonan Zhang, Sihan Yu, Linke Guo:
IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems. 3899-3912 - Xuyang Jing, Zheng Yan, Hui Han, Witold Pedrycz:
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch. 3913-3924 - Lingyuan Yin, Jing Xu, Qiang Tang:
Sidechains With Fast Cross-Chain Transfers. 3925-3940 - Guohua Tian, Yunhan Hu, Jianghong Wei, Zheli Liu, Xinyi Huang, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. 3941-3954 - Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh:
Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems. 3955-3970 - Mohammad M. Jalalzai, Chen Feng, Costas Busch, Golden G. Richard III, Jianyu Niu:
The Hermes BFT for Blockchains. 3971-3986 - Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. 3987-4001 - Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. 4002-4018 - Damu Ding, Marco Savi, Domenico Siracusa:
Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4. 4019-4031 - Rachid Guerraoui, Alexandre Maurer:
Byzantine-Resilient Multi-Agent System. 4032-4038 - Berk Gülmezoglu:
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. 4039-4051 - Amir Rezapour, Wen-Guey Tzeng:
RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm. 4052-4067 - Maryam Farajzadeh-Zanjani, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif:
Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System. 4068-4081 - Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani:
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. 4082-4098 - Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. 4099-4112 - Bin Xie, Tao Xiang, Xiaofeng Liao, Jiahui Wu:
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment. 4113-4126 - Samaikya Valluripally, Aniket Gulhane, Khaza Anuarul Hoque, Prasad Calyam:
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness. 4127-4144 - Pengfei Tang, Wenjie Wang, Jian Lou, Li Xiong:
Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks. 4145-4155 - Zihan Sha, Hui Shu, Xiaobing Xiong, Fei Kang:
Model of Execution Trace Obfuscation Between Threads. 4156-4171 - Anas Daghistani, Mosab Khayat, Muhamad Felemban, Walid G. Aref, Arif Ghafoor:
Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems. 4172-4186 - Saeid Mofrad, Ishtiaq Ahmed, Fengwei Zhang, Shiyong Lu, Ping Yang, Heming Cui:
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments. 4187-4203 - Haibin Zheng, Jinyin Chen, Hang Du, Weipeng Zhu, Shouling Ji, Xuhong Zhang:
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation. 4204-4224 - Xiaojun Zhang, Chao Huang, Yuan Zhang, Sheng Cao:
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids. 4225-4239 - Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-Free Device Pairing by Randomly Switching Power. 4240-4254 - Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. 4255-4269 - Jiahui Hou, Huiqi Liu, Yunxin Liu, Yu Wang, Peng-Jun Wan, Xiang-Yang Li:
Model Protection: Real-Time Privacy-Preserving Inference Service for Model Privacy at the Edge. 4270-4284 - Albert Guan, Chia-Mei Chen:
A Novel Verification Scheme to Resist Online Password Guessing Attacks. 4285-4293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.